US20020156743A1 - Method and system for detecting pirated content - Google Patents

Method and system for detecting pirated content Download PDF

Info

Publication number
US20020156743A1
US20020156743A1 US09/843,102 US84310201A US2002156743A1 US 20020156743 A1 US20020156743 A1 US 20020156743A1 US 84310201 A US84310201 A US 84310201A US 2002156743 A1 US2002156743 A1 US 2002156743A1
Authority
US
United States
Prior art keywords
content
highly compressed
recited
pieces
piece
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/843,102
Other versions
US7424747B2 (en
Inventor
John DeTreville
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US09/843,102 priority Critical patent/US7424747B2/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DETREVILLE, JOHN D.
Publication of US20020156743A1 publication Critical patent/US20020156743A1/en
Application granted granted Critical
Publication of US7424747B2 publication Critical patent/US7424747B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • This invention relates to piracy, and more particularly to detecting pirated content.
  • digital content may be played back in analog form and an analog recording made of the content, which in turn can be converted to digital form again, such as a song stored in digital form being played back in analog form recorded on an analog tape recorder and then the analog recording converted back to digital form.
  • Another proposed solution is to add watermarks or fingerprints to the digital content that cannot be removed without causing noticeable damage to the content.
  • Software programs can then be designed to not copy any content that is watermarked or fingerprinted.
  • Such proposed watermarks or fingerprints are designed such that they cannot be removed even when making an analog copy of the digital content.
  • concerns have been raised as to whether such watermarks or fingerprints can be created and used in an effective manner.
  • a content player stores a list of highly compressed content pieces that correspond to different pieces of content (e.g., audio content, video content, audio/video content, etc.).
  • the list of highly compressed content pieces stored at a content player can be static, or alternatively change over time.
  • a piece of content to be played back by the content player is compared to the highly compressed content pieces stored at the content player. If the piece of content to be played back matches one of the highly compressed content pieces, then appropriate responsive action is taken.
  • This responsive action can vary, and can include, for example, checking for a valid license, giving the user the option to notify the publisher if he or she has unknowingly acquired a pirated copy of the content, etc.
  • FIG. 1 is a block diagram illustrating an exemplary environment in which the present invention may be practiced.
  • FIG. 2 is a block diagram illustrating an exemplary system incorporating the present invention.
  • FIG. 3 is a block diagram illustrating an exemplary content player in more detail.
  • FIG. 4 is a flow chart illustrating an exemplary process for implementing piracy detection in accordance with certain embodiments of the invention.
  • FIG. 5 shows a general example of a computer that can be used in accordance with certain embodiments of the invention.
  • FIG. 1 is a block diagram illustrating an exemplary environment in which the present invention may be practiced.
  • Content is made available from a content publisher 102 and distributed as secure content 104 .
  • Content 104 is referred to as being secure due to a highly compressed version of each portion of the content being made available to detect piracy, as discussed in more detail below.
  • Secure content 104 is made available to content player 106 for playback to a user of player 106 .
  • Content layer 106 can be any of a wide variety of devices for playing content, such as desktop or portable computers computing devices, gaming consoles, consumer electronic devices, automotive PCs, handheld PCs, portable music players, portable video players, personal digital assistants (PDAs), etc.
  • PDAs personal digital assistants
  • Content 104 can be made available in any of a wide variety of conventional formats, such as CD-ROM, DVD, magnetic tape, downloadable files (such as MP3), streaming media, etc. Additionally, content 104 represents any of a wide variety of conventional media content, such as audio content, video content, audio/video content, etc. Content 104 includes multiple pieces or portions, which can be an entire content work (e.g., a song for audio content, a movie or television program for audio/video content, etc.), or alternatively only part of a work (e.g., part of a song, part of a movie, etc.).
  • content work e.g., a song for audio content, a movie or television program for audio/video content, etc.
  • part of a work e.g., part of a song, part of a movie, etc.
  • Content publisher 102 also makes pieces of highly compressed content 108 available to content player 106 .
  • the highly compressed content pieces 108 are highly compressed versions of all of content 104 , or of portions of content 104 . These highly compressed content pieces refer to versions of portions of content 104 that are created in a manner so that the highly compressed form cannot be decompressed into an intelligible form yet can be compared to uncompressed content for equality with a high degree of accuracy. For example, if the highly compressed content piece for a particular song were to be audibly rendered, it would sound noticeably different from the playback of the song.
  • Content publisher 102 makes highly compressed content available for each portion of content 104 .
  • a pirate 110 makes unauthorized copies of content 104 and provides pirated content 112 to content player 106 .
  • the user of content player 106 may or may not realize that the content 112 is pirated.
  • Content player 106 compares the content at player 106 (for example, during playback of the content) to the subset of highly compressed content pieces 108 stored at player 106 . If a match between the content and one of the subset of highly compressed content pieces is identified, content player 106 takes appropriate action. This appropriate action can vary based on the programming of player 106 as well as the desires of the user of player 106 .
  • Examples of appropriate action or actions include checking for a valid license at player 106 for the content, accessing another device (not shown) for a more thorough analysis to determine whether the content actually matches content for which player 106 has a license, allowing the user of player 106 to notify the content publisher or other authority of the existence of the pirated content (for example, in return for a potential reward), etc.
  • FIG. 2 is a block diagram illustrating an exemplary system incorporating the present invention.
  • Content player 106 stores pieces of content 130 and a highly compressed content list 132 .
  • the highly compressed content list 132 includes one or more pieces of highly compressed content received from a highly compressed content source 134 , which in turn receives the highly compressed content pieces from a content compressor 140 (e.g., a computing device operated by publisher 102 of FIG. 1).
  • Content player 106 communicates with source 134 via a network 136 .
  • the highly compressed content pieces may be generated at player 106 .
  • a portion of content (such as a song) may be communicated to content player 106 from content source 138 via network 136 .
  • player 106 Upon receipt of such content, player 106 generates the highly compressed content piece, stores the generated piece in list 132 , and deletes the received portion from its memory. However, if the highly compressed content pieces are generated at player 106 , care should be taken to ensure that content player 106 is physically secure so that unauthorized copies of the received portion cannot be made prior to their deletion.
  • Network 136 represents any of a wide variety of data communications networks, including public and/or private networks (such as the Internet), using both wired and wireless media. Communications between source 134 and content player 106 can be carried out in accordance with any of a wide variety of conventional protocols. Although only a single content player 106 , a single highly compressed content source 134 , and a single content source 138 are illustrated in FIG. 2, multiple such players 106 and sources 134 and 138 can be communicatively coupled together via network 136 .
  • content player 106 compares the pieces of highly compressed content in list 132 with content pieces 130 (e.g., songs) that are made available to it.
  • Content pieces 130 may be stored in memory of content player 106 or alternatively an external source accessible to player 106 , such as an optical disk. Multiple content portions 130 may be stored in player 106 , with the number of portions stored varying based on the amount memory available in player 106 and storage requirements of each content portion 130 .
  • the comparison between content 130 and the highly compressed content pieces 132 can occur at various times. In one implementation, the comparison is performed during playback of the content portion 130 . Alternatively, the comparison may be performed at other times, such as during “down” times (for example, when player 106 is not playing back any content), when content is being downloaded for storage in player 106 , etc.
  • Content player 106 stores as list 132 only a subset of pieces of highly compressed content available from source 134 (or generated from content available from source 138 ). In one implementation this subset is a very small subset of the available pieces of highly compressed content (for example, the subset may be only 10 pieces).
  • the actual number of pieces of content stored in list 132 can vary over time and can vary on a per player basis. Additionally, the pieces of highly compressed content included in list 132 for a particular player 106 can vary over time. These pieces can be changed at any variety of intervals, such as at a particular time each day or each week, each time player 106 is coupled to network 136 , whenever requested by the user of player 106 , etc.
  • the probability of a match existing between a portion of content 130 and a piece of highly compressed content in list 132 on any one player 106 is fairly small. However, if the number of players 106 that include a highly compressed content list 132 is sufficiently large, and each player 106 can maintain a different list 132 , the overall probability of a match existing between a portion of content 130 and a piece of highly compressed content in one of the lists 132 on at least one of the multiple players 106 is rather large. Thus, the use of highly compressed content list 132 is more useful in identifying pirated content across multiple devices (for example, players 106 ) than on any one particular device.
  • the manner in which the content is highly compressed can vary.
  • the goal of the compression is to generate a compressed version of the content portion that cannot be decompressed into an intelligible form while at the same time can be compared to uncompressed content for a determination of equality with a high degree of accuracy, even in light of changes made to the content portion (e.g., a slight speeding up or slowing down of the playback speed, an echo or reverberation added, various parts being filtered out (such as very high or low frequencies), etc.).
  • the highly compressed content pieces themselves are not useable as playback substitutes for the underlying content portions (e.g., the highly compressed content piece for a song does not have enough information for a user to playback the highly compressed content piece and have it sound similar to the entirety of the song), yet the highly compressed content pieces can be compared to portions of content and the portion that the highly compressed content piece corresponds to reasonably accurately identified.
  • the goal of compression is to generate a compressed version of a song that cannot be decompressed to a listenable form and yet can be compared to uncompressed songs for a determination of equality with a high degree of accuracy.
  • the manner in which the comparison is made between a highly compressed piece and a content portion can vary, based at least in part on the manner in which the highly compressed piece was generated.
  • a variety of different compression techniques can be used to generate a highly compressed content piece.
  • One such technique is described in a co-pending U.S. patent application No. ______ , filed ______ , entitled “Recognizer of Audio-Content in Digital Signals”, to M. Kivanc Mihcak and Ramarathnam Venkatesan, attorney docket no. MS1-645US, which is hereby incorporated by reference.
  • Another compression technique that can be used is based on the energy of the content over time. The energy of audio content can be calculated over a variety of different energy bands, and using a variety of different techniques.
  • the energy is calculated by dividing the audio into fixed-sized segments (e.g., 10 millisecond segments) and then computing the sum of the squares of the signed audio samples in each segment.
  • a song may be compressed by reducing the song to a list of energies computed for each 10 millisecond segment of the song. A number of contiguous groups of energies from this list are then extracted in any of a variety of different manners, such as at random. Groups of energies are extracted from this list, and in one implementation 10 groups of 100 samples of the energy (each representing a total of one second of the song) are extracted. These extracted energy groups for a particular song are then used as the highly compressed content piece for the corresponding song.
  • the energies of these channels can be added together.
  • other channel selection or combinations may be used, such as selecting the loudest channel, representing the energies independently, etc.
  • each group e.g., the number of samples in each group
  • the number of groups to be extracted can also vary. In one implementation, care should be taken to select the number of groups to be small enough so that highly compressed content pieces are not mistakenly matched to the wrong content portions.
  • song #1 may include parts of song #2 within it, resulting in groups from the highly compressed content piece associated with song #2 matching song #1. Care should be taken that the number of groups used is not large enough so that enough of the groups from the highly compressed content piece associated with song #2 match song #1 to cause the comparison process to indicate that the highly compressed content piece associated with song #2 matches song #1.
  • Different compression techniques can be used for different types of content (e.g., other than purely audio content).
  • a list of the brightness of each frame of video may be generated, and groups of these brightness values extracted from the list and used as the highly compressed content piece for the corresponding video content.
  • the brightness of each frame could be computed by summing the intensity of each pixel in the frame.
  • the highly compressed content piece corresponding to the audio/video content may be made up of groups extracted from the audio part of the content, from the video part of the content, or alternatively both the audio and video parts (e.g., some groups from both).
  • the groups of samples may be extracted from the list of energies for the content in any of a variety of manners.
  • the set of groups of energies may be extracted according to some predetermined process or alternatively randomly.
  • the selection of groups of samples is weighted so that more (or alternatively all) of the groups are selected from the beginning of the content.
  • all of the groups may be selected from the first half of a song. This allows the comparison process to evaluate most (if not all) of the groups before the entire content portion is played back (assuming the comparison is being performed during playback of the content).
  • a large set e.g., twenty or thirty
  • some other criteria e.g., those with the highest energy
  • a sub-set e.g., ten
  • the energy for each segment of the content portion to be played back is extracted from the content portion using the same technique as was used to generate the highly compressed content piece.
  • a sliding window (sliding one audio sample at a time) is used to select a group of energy samples of the same size as the groups used in generating the highly compressed content pieces. In situations where the comparison is being made as the content is being played back, the sliding window includes the energy samples for the most recently played back content.
  • the value of the energy in each group of the highly compressed content piece is then compared to the energy of the generated group based on the content to be played back, and if the values for two groups are within a threshold amount then the process identifies a match between that group of the highly compressed content portion and the portion to be played back.
  • each group may be normalized and then represented by a vector that includes one element for each energy value included in the group.
  • a difference between these two vectors may be generated using any of a variety of well-known processes, such as by summing the squares of the differences, and the resultant value compared to the threshold.
  • the comparison process then checks how many of the groups for each highly compressed content piece match the content portion to be played back. If greater than a threshold number of groups match (e.g., greater than 75% of the number of groups in the highly compressed content piece), then the highly compressed content piece is identified as a match to the content portion to be played back.
  • a threshold number of groups e.g., greater than 75% of the number of groups in the highly compressed content piece
  • the comparison process need not account for where in the corresponding content the different groups are extracted from (e.g., five seconds into a song, two minutes into a song, etc.). By not factoring the time that the groups correspond to into the comparison process, the comparison process is more tolerant of changes made to the content by time compression or expansion (e.g., speeding up or slowing down the content in an attempt to avoid a match).
  • each group in the highly compressed content piece and the content portion may have a timestamp associated with it that identifies an offset (e.g., from the start of the song) into the song at which the group begins.
  • the timestamps of the two groups need to be within a threshold distance of each other (e.g., within ten seconds of each other).
  • an indication may be maintained of an ordering of the groups in each highly compressed content piece.
  • the groups identified in the highly compressed content piece need to match, in the same order as they appear in the highly compressed content piece, groups in the content portion to be played back.
  • Desirable features to be used include those features which represent some particularly audible characteristic (so that audible changes to the content can be detected). Examples of such additional features include computing and comparing the rhythm or beat of audio content, or the balance among the various frequency bands, or whether each energy sample in sequence is or is not greater than the previous sample (followed by a computation of the correlation of the binary values), or by a variety of other techniques.
  • FIG. 3 is a block diagram illustrating an exemplary content player in more detail.
  • Content player 106 includes a storage device 160 , which may be any of one or more types of storage devices including both volatile and non-volatile memory.
  • storage device 160 may be one or more of random access memory (RAM), read-only memory (ROM), Flash memory, magnetic disk, optical disk, etc.
  • Storage device 160 optionally includes content 130 to display to a user of player 106 via an output controller 162 .
  • Output controller 162 renders content 130 via one or more output devices (not shown) of player 106 .
  • the exact nature of output controller 162 can vary depending on the type of content to be rendered. For example, output controller 162 may convert digital content 130 into analog signals for playback of audio content by one or more speakers, output controller 162 may be a conventional video controller for outputting video signals, etc.
  • media content for playback by content player 106 may be received from external source 164 .
  • External source 164 may be any of a wide variety of conventional storage devices such as Flash memory, optical disk, magnetic disk, etc.
  • Content from source 164 is received by playback controller 166 which communicates with output controller 162 to coordinate the playback of the content from source 164 .
  • the content player 106 may also be used to forward content to other content players, either automatically or on request. This includes the case where the content player operates as a server on a network, whether or not it is used to play back content locally.
  • Content player 106 also includes an interface 168 via which pieces of highly compressed content can be received from highly compressed content source 134 .
  • content player 106 may include a compressor 170 which receives, via interface 168 , content from a content source (for example, source 138 of FIG. 2) and generates the highly compressed content pieces for list 132 of the based on the received content.
  • a content source for example, source 138 of FIG. 2
  • Content player 106 also includes a comparator 172 which compares content 130 and/or content from content source 164 to the highly compressed content pieces in list 132 . As discussed above, this comparison can be performed at a wide variety of different times, such as during playback of the content, when downloading the content, during times when content player 106 is neither downloading new content 130 or playing back content, etc. However, regardless of when (if ever) the content is actually played back by content player 106 , the content is available for playback and is also referred to herein as content to be played back.
  • comparator 172 detects a match between a piece of highly compressed content from list 132 and the content to be played back (either content 130 or content from source 164 ), comparator 172 informs a resolver 174 of the match. Resolver 174 takes an appropriate action in response to such a match, which indicates that the content to be played back has been identified.
  • Resolver 174 can take any of a wide variety of actions in response to comparator 172 indicating a match.
  • resolver 174 compares the now-established identity of the content to be played back with a set of one or more licenses 176 maintained in storage device 160 .
  • Licenses 176 identify content which the user of content player 106 is authorized to playback (for example, for which the user has purchased a license).
  • Licenses 176 can be created and stored on storage device 160 in any of a variety of manners. Such licenses may be received from the content publisher or distributor along with the content licensed. Alternatively, the license may be a separate code (for example, a string of characters and/or digits) which the user must manually enter (for example, via a keyboard).
  • Each license 176 identifies the content that it corresponds to.
  • Resolver 174 compares the identification of the content to be played back with the licenses 176 to determine whether the user of content player 106 has acquired a valid license for the content. If resolver 174 identifies a license 176 for the content to be played back, then no further action need be taken (except for playing back or continuing to play back the content).
  • resolver 174 notifies the user of player 106 that he or she has no valid license for the content to the playback.
  • Resolver 174 can then give the user various options, such as: notify the publisher of the content (or other authority) of the unauthorized content and provide information to the publisher to assist in identifying the source of the unauthorized copy (various incentives may be provided to the user to reveal such information, such as a monetary award for assisting in identifying the source), ignore the lack of a license, attempt to obtain a valid license for the content, etc.
  • other actions could be taken.
  • resolver 174 may contact another remote source (not shown) to perform a more thorough analysis of whether the content to be played back matches a highly compressed content piece from list 132 (e.g., download an additional set of groups for the content and perform the comparison again using the larger set).
  • resolver 174 may automatically notify the publisher of the pirated copy, resolver 174 may prevent the copy from being played back (or playback of the remaining portion may be prohibited), etc.
  • the highly compressed content list 132 includes an indication of what license, if any, is needed in order to playback the associated content.
  • the highly compressed content list 132 may include as the indication a public key of the publisher of the content.
  • One of licenses 176 (previously signed by the publisher of the content using the private key of the publisher, or alternatively a chain of delegation certificates that leads to a license or other certificate signed by the publisher of the content using the private key of the publisher) can then be decrypted using the public key from the highly compressed content list 132 , and the decrypted license can be reviewed by resolver 174 to determine whether content player 106 has a license for the corresponding content.
  • resolver 174 allows the content to be played back without taking any further action since it does not matter whether the license 176 exists for the content to be played back.
  • FIG. 4 is a flow chart illustrating an exemplary process for implementing piracy detection in accordance with certain embodiments of the invention.
  • the process of FIG. 4 is implemented by a content player 106 (of FIGS. 1 - 3 ) and may be performed in software.
  • the content player receives a list update (act 202 ) that is to be used as the subset of highly compressed content pieces for the content player (for example, list 132 of FIG. 3).
  • the content player receives a play request (act 204 ) for content stored at or otherwise accessible to the content player.
  • the content player determines whether the content whose playback is requested matches any entry in the list (act 206 ). If there is no match, then the content player plays back the content (action 208 ).
  • the content player checks whether it is licensed to playback the requested content (act 210 ). If the content player is licensed to playback the requested content, then it does so (act 208 ). However, if the content player is not licensed to playback the requested content, then the content player takes appropriate remedial action (act 212 ), such as those discussed above with reference to resolver 174 of FIG. 3.
  • FIG. 5 shows a general example of a computer 342 that can be used in accordance with certain embodiments of the invention.
  • Computer 342 is shown as an example of a computer in which various embodiments of the invention can be practiced, and can be, for example, a content player 106 of FIGS. 1 - 3 , or a source 134 or 138 or compressor 140 of FIG. 2, etc.
  • Computer 342 is illustrated as only an example of a computing device that may be used with the invention; other devices may alternatively used that include more components or alternatively fewer components than those illustrated in FIG. 5.
  • Computer 342 includes one or more processors or processing units 344 , a system memory 346 , and a bus 348 that couples various system components including the system memory 346 to processors 344 .
  • the bus 348 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
  • the system memory 346 includes read only memory (ROM) 350 and random access memory (RAM) 352 .
  • ROM read only memory
  • RAM random access memory
  • a basic input/output system (BIOS) 354 containing the basic routines that help to transfer information between elements within computer 342 , such as during start-up, is stored in ROM 350 .
  • Computer 342 further includes a hard disk drive 356 for reading from and writing to a hard disk, not shown, connected to bus 348 via a hard disk drive interface 357 (e.g., a SCSI, ATA, or other type of interface); a magnetic disk drive 358 for reading from and writing to a removable magnetic disk 360 , connected to bus 348 via a magnetic disk drive interface 361 ; and an optical disk drive 362 for reading from and/or writing to a removable optical disk 364 such as a CD ROM, DVD, or other optical media, connected to bus 348 via an optical drive interface 365 .
  • the drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for computer 342 .
  • exemplary environment described herein employs a hard disk, a removable magnetic disk 360 and a removable optical disk 364 , it will be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, random access memories (RAMs), read only memories (ROM), and the like, may also be used in the exemplary operating environment.
  • RAMs random access memories
  • ROM read only memories
  • a number of program modules may be stored on the hard disk, magnetic disk 360 , optical disk 364 , ROM 350 , or RAM 352 , including an operating system 370 , one or more application programs 372 , other program modules 374 , and program data 376 .
  • a user may enter commands and information into computer 342 through input devices such as keyboard 378 and pointing device 380 .
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
  • These and other input devices are connected to the processing unit 344 through an interface 368 that is coupled to the system bus (e.g., a serial port interface, a parallel port interface, a universal serial bus (USB) interface, etc.).
  • a monitor 384 or other type of display device is also connected to the system bus 348 via an interface, such as a video adapter 386 .
  • personal computers typically include other peripheral output devices (not shown) such as speakers and printers.
  • Computer 342 operates in a networked environment using logical connections to one or more remote computers, such as a remote computer 388 .
  • the remote computer 388 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to computer 342 , although only a memory storage device 390 has been illustrated in FIG. 5.
  • the logical connections depicted in FIG. 5 include a local area network (LAN) 392 and a wide area network (WAN) 394 .
  • LAN local area network
  • WAN wide area network
  • Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet.
  • computer 342 executes an Internet Web browser program (which may optionally be integrated into the operating system 370 ) such as the “Internet Explorer” Web browser manufactured and distributed by Microsoft Corporation of Redmond, Washington.
  • computer 342 When used in a LAN networking environment, computer 342 is connected to the local network 392 through a network interface or adapter 396 . When used in a WAN networking environment, computer 342 typically includes a modem 398 or other means for establishing communications over the wide area network 394 , such as the Internet.
  • the modem 398 which may be internal or external, is connected to the system bus 348 via a serial port interface 368 .
  • program modules depicted relative to the personal computer 342 may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • Computer 342 also includes a broadcast tuner 400 .
  • Broadcast tuner 400 receives broadcast signals either directly (e.g., analog or digital cable transmissions fed directly into tuner 400 ) or via a reception device (e.g., via antenna or satellite dish).
  • Computer 342 typically includes at least some form of computer readable media.
  • Computer readable media can be any available media that can be accessed by computer 342 .
  • Computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other media which can be used to store the desired information and which can be accessed by computer 342 .
  • Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media includes wired media such as wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
  • program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • functionality of the program modules may be combined or distributed as desired in various embodiments.
  • the invention may be implemented in hardware or a combination of hardware, software, and/or firmware.
  • ASICs application specific integrated circuits

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

A content player can detect pirated content by storing a list of highly compressed content pieces that correspond to different pieces of content (e.g., audio content, video content, audio/video content, etc.). A piece of content to be played back by the content player is compared to the highly compressed content pieces stored at the content player. If the piece of content to be played back matches one of the highly compressed content pieces, then appropriate responsive action is taken. This responsive action can vary, and can include, for example, checking for a valid license, giving the user the option to notify the publisher if he or she has unknowingly acquired a pirated copy of the content, etc.

Description

    TECHNICAL FIELD
  • This invention relates to piracy, and more particularly to detecting pirated content. [0001]
  • BACKGROUND OF THE INVENTION
  • The unauthorized copying of media content, often referred to as piracy, is a major concern to the authors, publishers, and distributors of such content. For example, audio content such as songs and video content such as movies can often times be easily copied by people without the legal right to do so. This problem has become particularly troublesome as digital content becomes more pervasive, as storage devices become increasingly cheaper, and as computers become more interconnected (e.g., via the Internet). Unauthorized copying of media content can take place in several forms. For example, digital content may be copied byte by byte on a computer. By way of another example, digital content may be played back in analog form and an analog recording made of the content, which in turn can be converted to digital form again, such as a song stored in digital form being played back in analog form recorded on an analog tape recorder and then the analog recording converted back to digital form. [0002]
  • Various solutions have been proposed to prevent piracy of digital content. One such solution is to encrypt the digital content. Such encryption can often prevent, or at the very least make difficult, the use of unauthorized copies of the digital content. However, the content is inevitably decrypted at some point prior to the final presentation to the user and can be copied while it is unencrypted. For example, in the extreme case, encryption typically does not prevent an individual from making an analog recording of the digital content after it has been decrypted and converted to analog form, and then storing the analog recording in a digital form. Such a digital to analog to digital copying scheme typically results in a newly saved digital recording that is not encrypted, and thus can be freely copied and distributed to unauthorized users. [0003]
  • Another proposed solution is to add watermarks or fingerprints to the digital content that cannot be removed without causing noticeable damage to the content. Software programs can then be designed to not copy any content that is watermarked or fingerprinted. Such proposed watermarks or fingerprints are designed such that they cannot be removed even when making an analog copy of the digital content. However, concerns have been raised as to whether such watermarks or fingerprints can be created and used in an effective manner. [0004]
  • The invention described below addresses these disadvantages, providing methods and systems for detecting pirated content. [0005]
  • SUMMARY OF THE INVENTION
  • A method and system for detecting pirated content is described herein. [0006]
  • In accordance with one aspect, a content player stores a list of highly compressed content pieces that correspond to different pieces of content (e.g., audio content, video content, audio/video content, etc.). The list of highly compressed content pieces stored at a content player can be static, or alternatively change over time. A piece of content to be played back by the content player is compared to the highly compressed content pieces stored at the content player. If the piece of content to be played back matches one of the highly compressed content pieces, then appropriate responsive action is taken. This responsive action can vary, and can include, for example, checking for a valid license, giving the user the option to notify the publisher if he or she has unknowingly acquired a pirated copy of the content, etc.[0007]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings. The same numbers are used throughout the figures to reference like components and/or features. [0008]
  • FIG. 1 is a block diagram illustrating an exemplary environment in which the present invention may be practiced. [0009]
  • FIG. 2 is a block diagram illustrating an exemplary system incorporating the present invention. [0010]
  • FIG. 3 is a block diagram illustrating an exemplary content player in more detail. [0011]
  • FIG. 4 is a flow chart illustrating an exemplary process for implementing piracy detection in accordance with certain embodiments of the invention. [0012]
  • FIG. 5 shows a general example of a computer that can be used in accordance with certain embodiments of the invention.[0013]
  • DETAILED DESCRIPTION
  • FIG. 1 is a block diagram illustrating an exemplary environment in which the present invention may be practiced. Content is made available from a [0014] content publisher 102 and distributed as secure content 104. Content 104 is referred to as being secure due to a highly compressed version of each portion of the content being made available to detect piracy, as discussed in more detail below. Secure content 104 is made available to content player 106 for playback to a user of player 106. Content layer 106 can be any of a wide variety of devices for playing content, such as desktop or portable computers computing devices, gaming consoles, consumer electronic devices, automotive PCs, handheld PCs, portable music players, portable video players, personal digital assistants (PDAs), etc. Content 104 can be made available in any of a wide variety of conventional formats, such as CD-ROM, DVD, magnetic tape, downloadable files (such as MP3), streaming media, etc. Additionally, content 104 represents any of a wide variety of conventional media content, such as audio content, video content, audio/video content, etc. Content 104 includes multiple pieces or portions, which can be an entire content work (e.g., a song for audio content, a movie or television program for audio/video content, etc.), or alternatively only part of a work (e.g., part of a song, part of a movie, etc.).
  • [0015] Content publisher 102 also makes pieces of highly compressed content 108 available to content player 106. The highly compressed content pieces 108 are highly compressed versions of all of content 104, or of portions of content 104. These highly compressed content pieces refer to versions of portions of content 104 that are created in a manner so that the highly compressed form cannot be decompressed into an intelligible form yet can be compared to uncompressed content for equality with a high degree of accuracy. For example, if the highly compressed content piece for a particular song were to be audibly rendered, it would sound noticeably different from the playback of the song. Content publisher 102 makes highly compressed content available for each portion of content 104. Although numerous pieces of highly compressed content are made available by content publisher 102, only a subset of those pieces is typically maintained by content player 106. The number of pieces included in this subset can vary, however, care should be taken in selecting the number of pieces in this subset given the available memory in content player 106 to store such pieces and the storage requirements of each piece.
  • In the environment of FIG. 1, a [0016] pirate 110 makes unauthorized copies of content 104 and provides pirated content 112 to content player 106. The user of content player 106 may or may not realize that the content 112 is pirated. Content player 106 compares the content at player 106 (for example, during playback of the content) to the subset of highly compressed content pieces 108 stored at player 106. If a match between the content and one of the subset of highly compressed content pieces is identified, content player 106 takes appropriate action. This appropriate action can vary based on the programming of player 106 as well as the desires of the user of player 106. Examples of appropriate action or actions include checking for a valid license at player 106 for the content, accessing another device (not shown) for a more thorough analysis to determine whether the content actually matches content for which player 106 has a license, allowing the user of player 106 to notify the content publisher or other authority of the existence of the pirated content (for example, in return for a potential reward), etc.
  • FIG. 2 is a block diagram illustrating an exemplary system incorporating the present invention. [0017] Content player 106 stores pieces of content 130 and a highly compressed content list 132. The highly compressed content list 132 includes one or more pieces of highly compressed content received from a highly compressed content source 134, which in turn receives the highly compressed content pieces from a content compressor 140 (e.g., a computing device operated by publisher 102 of FIG. 1). Content player 106 communicates with source 134 via a network 136. Alternatively, the highly compressed content pieces may be generated at player 106. For example, a portion of content (such as a song) may be communicated to content player 106 from content source 138 via network 136. Upon receipt of such content, player 106 generates the highly compressed content piece, stores the generated piece in list 132, and deletes the received portion from its memory. However, if the highly compressed content pieces are generated at player 106, care should be taken to ensure that content player 106 is physically secure so that unauthorized copies of the received portion cannot be made prior to their deletion.
  • [0018] Network 136 represents any of a wide variety of data communications networks, including public and/or private networks (such as the Internet), using both wired and wireless media. Communications between source 134 and content player 106 can be carried out in accordance with any of a wide variety of conventional protocols. Although only a single content player 106, a single highly compressed content source 134, and a single content source 138 are illustrated in FIG. 2, multiple such players 106 and sources 134 and 138 can be communicatively coupled together via network 136.
  • During operation, as shown in FIG. 3, [0019] content player 106 compares the pieces of highly compressed content in list 132 with content pieces 130 (e.g., songs) that are made available to it. Content pieces 130 may be stored in memory of content player 106 or alternatively an external source accessible to player 106, such as an optical disk. Multiple content portions 130 may be stored in player 106, with the number of portions stored varying based on the amount memory available in player 106 and storage requirements of each content portion 130. The comparison between content 130 and the highly compressed content pieces 132 can occur at various times. In one implementation, the comparison is performed during playback of the content portion 130. Alternatively, the comparison may be performed at other times, such as during “down” times (for example, when player 106 is not playing back any content), when content is being downloaded for storage in player 106, etc.
  • [0020] Content player 106 stores as list 132 only a subset of pieces of highly compressed content available from source 134 (or generated from content available from source 138). In one implementation this subset is a very small subset of the available pieces of highly compressed content (for example, the subset may be only 10 pieces). The actual number of pieces of content stored in list 132 can vary over time and can vary on a per player basis. Additionally, the pieces of highly compressed content included in list 132 for a particular player 106 can vary over time. These pieces can be changed at any variety of intervals, such as at a particular time each day or each week, each time player 106 is coupled to network 136, whenever requested by the user of player 106, etc.
  • Because the number of pieces maintained in [0021] list 132 is relatively small compared to the total number of content portions that may be available to player 106, the probability of a match existing between a portion of content 130 and a piece of highly compressed content in list 132 on any one player 106 is fairly small. However, if the number of players 106 that include a highly compressed content list 132 is sufficiently large, and each player 106 can maintain a different list 132, the overall probability of a match existing between a portion of content 130 and a piece of highly compressed content in one of the lists 132 on at least one of the multiple players 106 is rather large. Thus, the use of highly compressed content list 132 is more useful in identifying pirated content across multiple devices (for example, players 106) than on any one particular device.
  • The manner in which the content is highly compressed can vary. However, the goal of the compression is to generate a compressed version of the content portion that cannot be decompressed into an intelligible form while at the same time can be compared to uncompressed content for a determination of equality with a high degree of accuracy, even in light of changes made to the content portion (e.g., a slight speeding up or slowing down of the playback speed, an echo or reverberation added, various parts being filtered out (such as very high or low frequencies), etc.). In other words, the highly compressed content pieces themselves are not useable as playback substitutes for the underlying content portions (e.g., the highly compressed content piece for a song does not have enough information for a user to playback the highly compressed content piece and have it sound similar to the entirety of the song), yet the highly compressed content pieces can be compared to portions of content and the portion that the highly compressed content piece corresponds to reasonably accurately identified. For example, for audio content, the goal of compression is to generate a compressed version of a song that cannot be decompressed to a listenable form and yet can be compared to uncompressed songs for a determination of equality with a high degree of accuracy. Additionally, the manner in which the comparison is made between a highly compressed piece and a content portion can vary, based at least in part on the manner in which the highly compressed piece was generated. [0022]
  • A variety of different compression techniques can be used to generate a highly compressed content piece. One such technique is described in a co-pending U.S. patent application No. ______ , filed ______ , entitled “Recognizer of Audio-Content in Digital Signals”, to M. Kivanc Mihcak and Ramarathnam Venkatesan, attorney docket no. MS1-645US, which is hereby incorporated by reference. Another compression technique that can be used is based on the energy of the content over time. The energy of audio content can be calculated over a variety of different energy bands, and using a variety of different techniques. In one implementation the energy is calculated by dividing the audio into fixed-sized segments (e.g., 10 millisecond segments) and then computing the sum of the squares of the signed audio samples in each segment. By way of example, a song may be compressed by reducing the song to a list of energies computed for each 10 millisecond segment of the song. A number of contiguous groups of energies from this list are then extracted in any of a variety of different manners, such as at random. Groups of energies are extracted from this list, and in one implementation 10 groups of 100 samples of the energy (each representing a total of one second of the song) are extracted. These extracted energy groups for a particular song are then used as the highly compressed content piece for the corresponding song. In situations where multiple channels are associated with the content (e.g., left and right channels for stereo audio content), the energies of these channels can be added together. Alternatively, other channel selection or combinations may be used, such as selecting the loudest channel, representing the energies independently, etc. [0023]
  • The size of each group (e.g., the number of samples in each group) can vary. In one implementation, care should be taken to select the size of each group to be small enough that time compression and/or time expansion of the content does not adversely affect the comparison process. For example, a pirate may attempt to circumvent the piracy detection described herein by altering the timeline of the content for playback, thereby speeding up or slowing down playback slightly. If the size of each group is too large, then this timeline alteration can cause a match between a group of a highly compressed content piece to be missed. [0024]
  • The number of groups to be extracted can also vary. In one implementation, care should be taken to select the number of groups to be small enough so that highly compressed content pieces are not mistakenly matched to the wrong content portions. For example, [0025] song #1 may include parts of song #2 within it, resulting in groups from the highly compressed content piece associated with song #2 matching song #1. Care should be taken that the number of groups used is not large enough so that enough of the groups from the highly compressed content piece associated with song #2 match song #1 to cause the comparison process to indicate that the highly compressed content piece associated with song #2 matches song #1.
  • Different compression techniques can be used for different types of content (e.g., other than purely audio content). For example, in the case of video content, a list of the brightness of each frame of video may be generated, and groups of these brightness values extracted from the list and used as the highly compressed content piece for the corresponding video content. For example, the brightness of each frame could be computed by summing the intensity of each pixel in the frame. By way of another example, in the case of audio/video content, the highly compressed content piece corresponding to the audio/video content may be made up of groups extracted from the audio part of the content, from the video part of the content, or alternatively both the audio and video parts (e.g., some groups from both). [0026]
  • The groups of samples may be extracted from the list of energies for the content in any of a variety of manners. For example, the set of groups of energies may be extracted according to some predetermined process or alternatively randomly. In one implementation, the selection of groups of samples is weighted so that more (or alternatively all) of the groups are selected from the beginning of the content. For example, all of the groups may be selected from the first half of a song. This allows the comparison process to evaluate most (if not all) of the groups before the entire content portion is played back (assuming the comparison is being performed during playback of the content). By way of another example, a large set (e.g., twenty or thirty) of groups may be initially extracted at random, and then some other criteria (e.g., those with the highest energy) used to select a sub-set (e.g., ten) of groups. [0027]
  • To compare a highly compressed content piece to a content portion that is to be played back, the energy for each segment of the content portion to be played back is extracted from the content portion using the same technique as was used to generate the highly compressed content piece. A sliding window (sliding one audio sample at a time) is used to select a group of energy samples of the same size as the groups used in generating the highly compressed content pieces. In situations where the comparison is being made as the content is being played back, the sliding window includes the energy samples for the most recently played back content. The value of the energy in each group of the highly compressed content piece is then compared to the energy of the generated group based on the content to be played back, and if the values for two groups are within a threshold amount then the process identifies a match between that group of the highly compressed content portion and the portion to be played back. [0028]
  • The distance between the energies of two groups can be determined in any of a wide variety of conventional manners. For example, each group may be normalized and then represented by a vector that includes one element for each energy value included in the group. A difference between these two vectors may be generated using any of a variety of well-known processes, such as by summing the squares of the differences, and the resultant value compared to the threshold. [0029]
  • The comparison process then checks how many of the groups for each highly compressed content piece match the content portion to be played back. If greater than a threshold number of groups match (e.g., greater than 75% of the number of groups in the highly compressed content piece), then the highly compressed content piece is identified as a match to the content portion to be played back. [0030]
  • It should be noted that the comparison process need not account for where in the corresponding content the different groups are extracted from (e.g., five seconds into a song, two minutes into a song, etc.). By not factoring the time that the groups correspond to into the comparison process, the comparison process is more tolerant of changes made to the content by time compression or expansion (e.g., speeding up or slowing down the content in an attempt to avoid a match). [0031]
  • Additional information may also be incorporated into the process of determining whether a highly compressed content piece matches the content portion to be played back. For example, each group in the highly compressed content piece and the content portion may have a timestamp associated with it that identifies an offset (e.g., from the start of the song) into the song at which the group begins. In order for a group in the highly compressed content piece to match a group of the content portion, the timestamps of the two groups need to be within a threshold distance of each other (e.g., within ten seconds of each other). By way of another example, an indication may be maintained of an ordering of the groups in each highly compressed content piece. In order for the highly compressed content piece to match the content portion to be played back, the groups identified in the highly compressed content piece need to match, in the same order as they appear in the highly compressed content piece, groups in the content portion to be played back. [0032]
  • Although energy is described as being extracted above, other features of the content may also be extracted and used rather than energy. Desirable features to be used include those features which represent some particularly audible characteristic (so that audible changes to the content can be detected). Examples of such additional features include computing and comparing the rhythm or beat of audio content, or the balance among the various frequency bands, or whether each energy sample in sequence is or is not greater than the previous sample (followed by a computation of the correlation of the binary values), or by a variety of other techniques. [0033]
  • FIG. 3 is a block diagram illustrating an exemplary content player in more detail. [0034] Content player 106 includes a storage device 160, which may be any of one or more types of storage devices including both volatile and non-volatile memory. For example, storage device 160 may be one or more of random access memory (RAM), read-only memory (ROM), Flash memory, magnetic disk, optical disk, etc. Storage device 160 optionally includes content 130 to display to a user of player 106 via an output controller 162. Output controller 162 renders content 130 via one or more output devices (not shown) of player 106. The exact nature of output controller 162 can vary depending on the type of content to be rendered. For example, output controller 162 may convert digital content 130 into analog signals for playback of audio content by one or more speakers, output controller 162 may be a conventional video controller for outputting video signals, etc.
  • Alternatively, media content for playback by [0035] content player 106 may be received from external source 164. External source 164 may be any of a wide variety of conventional storage devices such as Flash memory, optical disk, magnetic disk, etc. Content from source 164 is received by playback controller 166 which communicates with output controller 162 to coordinate the playback of the content from source 164.
  • In addition to storing and playing back the content, the [0036] content player 106 may also be used to forward content to other content players, either automatically or on request. This includes the case where the content player operates as a server on a network, whether or not it is used to play back content locally.
  • [0037] Content player 106 also includes an interface 168 via which pieces of highly compressed content can be received from highly compressed content source 134. Alternatively, content player 106 may include a compressor 170 which receives, via interface 168, content from a content source (for example, source 138 of FIG. 2) and generates the highly compressed content pieces for list 132 of the based on the received content.
  • [0038] Content player 106 also includes a comparator 172 which compares content 130 and/or content from content source 164 to the highly compressed content pieces in list 132. As discussed above, this comparison can be performed at a wide variety of different times, such as during playback of the content, when downloading the content, during times when content player 106 is neither downloading new content 130 or playing back content, etc. However, regardless of when (if ever) the content is actually played back by content player 106, the content is available for playback and is also referred to herein as content to be played back. In the event comparator 172 detects a match between a piece of highly compressed content from list 132 and the content to be played back (either content 130 or content from source 164), comparator 172 informs a resolver 174 of the match. Resolver 174 takes an appropriate action in response to such a match, which indicates that the content to be played back has been identified.
  • [0039] Resolver 174 can take any of a wide variety of actions in response to comparator 172 indicating a match. In one implementation, resolver 174 compares the now-established identity of the content to be played back with a set of one or more licenses 176 maintained in storage device 160. Licenses 176 identify content which the user of content player 106 is authorized to playback (for example, for which the user has purchased a license). Licenses 176 can be created and stored on storage device 160 in any of a variety of manners. Such licenses may be received from the content publisher or distributor along with the content licensed. Alternatively, the license may be a separate code (for example, a string of characters and/or digits) which the user must manually enter (for example, via a keyboard). Each license 176 identifies the content that it corresponds to. Resolver 174 compares the identification of the content to be played back with the licenses 176 to determine whether the user of content player 106 has acquired a valid license for the content. If resolver 174 identifies a license 176 for the content to be played back, then no further action need be taken (except for playing back or continuing to play back the content).
  • However, if no [0040] license 176 corresponds to the content to be played back, and the content requires licensing, resolver 174 notifies the user of player 106 that he or she has no valid license for the content to the playback. Resolver 174 can then give the user various options, such as: notify the publisher of the content (or other authority) of the unauthorized content and provide information to the publisher to assist in identifying the source of the unauthorized copy (various incentives may be provided to the user to reveal such information, such as a monetary award for assisting in identifying the source), ignore the lack of a license, attempt to obtain a valid license for the content, etc. Alternatively, other actions could be taken. For example, resolver 174 may contact another remote source (not shown) to perform a more thorough analysis of whether the content to be played back matches a highly compressed content piece from list 132 (e.g., download an additional set of groups for the content and perform the comparison again using the larger set). By way of other examples, resolver 174 may automatically notify the publisher of the pirated copy, resolver 174 may prevent the copy from being played back (or playback of the remaining portion may be prohibited), etc.
  • The highly [0041] compressed content list 132 includes an indication of what license, if any, is needed in order to playback the associated content. For example, the highly compressed content list 132 may include as the indication a public key of the publisher of the content. One of licenses 176 (previously signed by the publisher of the content using the private key of the publisher, or alternatively a chain of delegation certificates that leads to a license or other certificate signed by the publisher of the content using the private key of the publisher) can then be decrypted using the public key from the highly compressed content list 132, and the decrypted license can be reviewed by resolver 174 to determine whether content player 106 has a license for the corresponding content. It should also be noted that situations can arise where the user of content player 106 attempts to playback content for which no license is necessary, such as content within the public domain. In these situations, resolver 174 allows the content to be played back without taking any further action since it does not matter whether the license 176 exists for the content to be played back.
  • FIG. 4 is a flow chart illustrating an exemplary process for implementing piracy detection in accordance with certain embodiments of the invention. The process of FIG. 4 is implemented by a content player [0042] 106 (of FIGS. 1-3) and may be performed in software. Initially, the content player receives a list update (act 202) that is to be used as the subset of highly compressed content pieces for the content player (for example, list 132 of FIG. 3). Subsequently, the content player receives a play request (act 204) for content stored at or otherwise accessible to the content player. In response to the play request, the content player determines whether the content whose playback is requested matches any entry in the list (act 206). If there is no match, then the content player plays back the content (action 208).
  • However, if there is a match, and the entry in the highly compressed content list indicated that a license is needed, then the content player checks whether it is licensed to playback the requested content (act [0043] 210). If the content player is licensed to playback the requested content, then it does so (act 208). However, if the content player is not licensed to playback the requested content, then the content player takes appropriate remedial action (act 212), such as those discussed above with reference to resolver 174 of FIG. 3.
  • FIG. 5 shows a general example of a [0044] computer 342 that can be used in accordance with certain embodiments of the invention. Computer 342 is shown as an example of a computer in which various embodiments of the invention can be practiced, and can be, for example, a content player 106 of FIGS. 1-3, or a source 134 or 138 or compressor 140 of FIG. 2, etc. Computer 342 is illustrated as only an example of a computing device that may be used with the invention; other devices may alternatively used that include more components or alternatively fewer components than those illustrated in FIG. 5.
  • [0045] Computer 342 includes one or more processors or processing units 344, a system memory 346, and a bus 348 that couples various system components including the system memory 346 to processors 344. The bus 348 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. The system memory 346 includes read only memory (ROM) 350 and random access memory (RAM) 352. A basic input/output system (BIOS) 354, containing the basic routines that help to transfer information between elements within computer 342, such as during start-up, is stored in ROM 350.
  • [0046] Computer 342 further includes a hard disk drive 356 for reading from and writing to a hard disk, not shown, connected to bus 348 via a hard disk drive interface 357 (e.g., a SCSI, ATA, or other type of interface); a magnetic disk drive 358 for reading from and writing to a removable magnetic disk 360, connected to bus 348 via a magnetic disk drive interface 361; and an optical disk drive 362 for reading from and/or writing to a removable optical disk 364 such as a CD ROM, DVD, or other optical media, connected to bus 348 via an optical drive interface 365. The drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for computer 342. Although the exemplary environment described herein employs a hard disk, a removable magnetic disk 360 and a removable optical disk 364, it will be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, random access memories (RAMs), read only memories (ROM), and the like, may also be used in the exemplary operating environment.
  • A number of program modules may be stored on the hard disk, [0047] magnetic disk 360, optical disk 364, ROM 350, or RAM 352, including an operating system 370, one or more application programs 372, other program modules 374, and program data 376. A user may enter commands and information into computer 342 through input devices such as keyboard 378 and pointing device 380. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are connected to the processing unit 344 through an interface 368 that is coupled to the system bus (e.g., a serial port interface, a parallel port interface, a universal serial bus (USB) interface, etc.). A monitor 384 or other type of display device is also connected to the system bus 348 via an interface, such as a video adapter 386. In addition to the monitor, personal computers typically include other peripheral output devices (not shown) such as speakers and printers.
  • [0048] Computer 342 operates in a networked environment using logical connections to one or more remote computers, such as a remote computer 388. The remote computer 388 may be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to computer 342, although only a memory storage device 390 has been illustrated in FIG. 5. The logical connections depicted in FIG. 5 include a local area network (LAN) 392 and a wide area network (WAN) 394. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. In certain embodiments of the invention, computer 342 executes an Internet Web browser program (which may optionally be integrated into the operating system 370) such as the “Internet Explorer” Web browser manufactured and distributed by Microsoft Corporation of Redmond, Washington.
  • When used in a LAN networking environment, [0049] computer 342 is connected to the local network 392 through a network interface or adapter 396. When used in a WAN networking environment, computer 342 typically includes a modem 398 or other means for establishing communications over the wide area network 394, such as the Internet. The modem 398, which may be internal or external, is connected to the system bus 348 via a serial port interface 368. In a networked environment, program modules depicted relative to the personal computer 342, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • [0050] Computer 342 also includes a broadcast tuner 400. Broadcast tuner 400 receives broadcast signals either directly (e.g., analog or digital cable transmissions fed directly into tuner 400) or via a reception device (e.g., via antenna or satellite dish).
  • [0051] Computer 342 typically includes at least some form of computer readable media. Computer readable media can be any available media that can be accessed by computer 342. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other media which can be used to store the desired information and which can be accessed by computer 342. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
  • The invention has been described in part in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments. [0052]
  • For purposes of illustration, programs and other executable program components such as the operating system are illustrated herein as discrete blocks, although it is recognized that such programs and components reside at various times in different storage components of the computer, and are executed by the data processor(s) of the computer. [0053]
  • Alternatively, the invention may be implemented in hardware or a combination of hardware, software, and/or firmware. For example, one or more application specific integrated circuits (ASICs) could be designed or programmed to carry out the invention. [0054]
  • Conclusion [0055]
  • Although the description above uses language that is specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the invention. [0056]

Claims (57)

1. A system comprising:
a source database storing a plurality of highly compressed content pieces; and
a content player, coupled to the source database, including, an interface to receive a subset of the plurality of highly compressed content pieces from the source database,
a storage device to store the subset,
a comparator to compare the subset to content and determine whether the content matches any of the plurality of highly compressed content pieces in the subset, and
a resolver to take particular action in response to the comparator indicating the content matches one of the plurality of highly compressed content pieces in the subset.
2. A system as recited in claim 1, wherein the comparator is to compare the subset to content being played by the content player.
3. A system as recited in claim 1, wherein the content player is coupled to the source database via the Internet.
4. A system as recited in claim 1, wherein the plurality of highly compressed content pieces comprises a plurality of highly compressed audio pieces.
5. A system as recited in claim 1, wherein the plurality of highly compressed content pieces comprises a plurality of highly compressed video pieces.
6. A system as recited in claim 1, wherein the plurality of highly compressed content pieces comprises a plurality of highly compressed audio/video pieces.
7. A system as recited in claim 1, wherein the interface is further to subsequently communicate with the source database, retrieve a new subset of the plurality of highly compressed content pieces from the source database, and replace the subset in the storage device with the new subset.
8. A system as recited in claim 1, further comprising a content source coupled to the content player, and wherein the content player further comprises a compressor to receive content from the content source, generate a highly compressed content piece based on the received content, and add the generated highly compressed content piece to the subset in the storage device.
9. A system as recited in claim 1, wherein the storage device is further to store a plurality of licenses identifying content that a user of the content player is authorized to playback, and wherein the particular action comprises the resolver checking whether one of the plurality of licenses corresponds to the content.
10. A system as recited in claim 9, wherein each of the plurality of highly compressed content pieces in the subset further indicates whether one of the plurality of licenses is required for playback of the content.
11. A system as recited in claim 1, wherein the storage device is further to store the content.
12. A system as recited in claim 1, further comprising a content source, coupled to the content player, from which the content is received.
13. A system as recited in claim 12, wherein the content player receives the content from the content source in its entirety before playback of the content begins.
14. A system as recited in claim 1, wherein the comparator is to determine whether the content matches any of the plurality of highly compressed content pieces in the subset by comparing a first set of feature values associated with each of the plurality of highly compressed content pieces with a second set of feature values associated with the content, and checking whether at least a threshold number of the first set of feature values is within threshold distance of the second set of feature values.
15. A system as recited in claim 14, wherein the first set of feature values and the second set of feature values each comprises a set of audio energy features.
16. A system comprising:
a memory to store one or more highly compressed content pieces; and
a comparator, coupled to the memory, to compare the one or more highly compressed content pieces to content at the system and to determine whether the content matches at least one of the one or more highly compressed content pieces.
17. A system as recited in claim 16, wherein the content at the system comprises content being played by the system.
18. A system as recited in claim 16, further comprising a resolver, coupled to the comparator, to take a particular action in response to the comparator indicating the content matches one of the plurality of highly compressed content pieces in the subset.
19. A system as recited in claim 18, wherein the particular action comprises checking to see whether the system has a valid license for the content.
20. A system as recited in claim 16, wherein the memory is further to store the content.
21. A system as recited in claim 16, further comprising a playback controller, coupled to the memory, to receive the content from an external source.
22. A system as recited in claim 21, wherein the external source comprises a CD.
23. A system as recited in claim 16, further comprising an interface, coupled to the memory, to receive the one or more highly compressed content pieces from a compressed content source.
24. A system as recited in claim 16, further comprising a compressor, coupled to the memory, to receive content and generate the one or more highly compressed content pieces.
25. A system as recited in claim 16, wherein the comparator is to determine whether the content matches any of the plurality of highly compressed content pieces in the subset by comparing a first set of feature values associated with each of the plurality of highly compressed content pieces with a second set of feature values associated with the content, and checking whether at least a threshold number of the first set of feature values is within threshold distance of the second set of feature values.
26. A system as recited in claim 25, wherein the first set of feature values and the second set of feature values each comprises a set of audio energy features.
27. A system as recited in claim 16, wherein the system comprises a portable music player.
28. A system as recited in claim 16, wherein each of the one or more highly compressed content pieces further indicates whether a license is required for playback of the corresponding content.
29. A method comprising:
comparing a portion of media content to a set of one or more highly compressed pieces of content;
determining whether the portion of media content matches any of the set of highly compressed pieces; and
taking a programmed action if the portion of media content matches any of the set of highly compressed pieces.
30. A method as recited in claim 29, wherein the portion of media content comprises a song.
31. A method as recited in claim 29, wherein the portion of media content comprises a video clip.
32. A method as recited in claim 29, further comprising performing the comparing while the portion of media content is being played.
33. A method as recited in claim 29, further comprising performing the comparing while the portion of media content is being downloaded from a content source.
34. A method as recited in claim 29, further comprising receiving the set of highly compressed pieces from a highly compressed content piece source.
35. A method as recited in claim 34, further comprising subsequently receiving a new set of highly compressed pieces from the highly compressed content piece source, and replacing the set with the new subset.
36. A method as recited in claim 29, further comprising:
receiving content from a content source;
generating a highly compressed piece based on the received content; and
adding the generated highly compressed piece to the set of highly compressed pieces.
37. A method as recited in claim 29, wherein the programmed action comprises checking whether one of a plurality of licenses maintained at a content player performing the comparing corresponds to the portion of media content.
38. A method as recited in claim 29, wherein the determining comprises:
comparing a first set of feature values associated with each of the plurality of highly compressed pieces with a second set of feature values associated with the portion of media content; and
checking whether at least a threshold number of the first set of feature values is within threshold distance of the second set of feature values.
39. A method as recited in claim 38, wherein the first set of feature values and the second set of feature values each comprises a set of audio energy features.
40. One or more computer-readable memories containing a computer program that is executable by a processor to perform a method comprising:
comparing a portion of media content to a set of one or more highly compressed pieces of content;
determining whether the portion of media content matches any of the set of highly compressed pieces; and
taking a programmed action if the portion of media content matches any of the set of highly compressed pieces.
41. A system comprising:
means for storing a set of highly compressed content pieces;
means for determining whether the portion of media content matches any of the set of highly compressed content pieces; and
means for taking a particular action if the portion of media content matches any of the set of highly compressed content pieces.
42. A system as recited in claim 41, further comprising means for receiving an update set of highly compressed content pieces and replacing the set of highly compressed content pieces with the update set of highly compressed content pieces.
43. A system as recited in claim 41, further comprising means for receiving the set of highly compressed content pieces.
44. A system as recited in claim 41, further comprising means for generating the set of highly compressed content pieces.
45. A system as recited in claim 41, wherein the means for storing is further for storing the portion of media content.
46. One or more computer-readable media having stored thereon a plurality of instructions that, when executed by one or more processors of a computer, causes the one or more processors to perform acts including:
checking whether a portion of media content matches a piece of highly compressed content, wherein the piece of highly compressed content cannot be played back to a user in an intelligible form;
allowing the portion of media content to be played back if the portion of media content does not match the piece of highly compressed content; and
taking a particular action if the portion of media content does match the piece of highly compressed content.
47. One or more computer-readable media as recited in claim 46, wherein the portion of media content includes one or more of audio content and video content.
48. One or more computer-readable media as recited in claim 46, wherein the plurality of instructions further cause the one or more processors to perform acts including receiving the piece of highly compressed content from a highly compressed content source.
49. One or more computer-readable media as recited in claim 48, wherein the plurality of instructions further cause the one or more processors to perform acts including subsequently receiving a new piece of highly compressed content from the highly compressed content source, and replacing the piece with the new piece.
50. One or more computer-readable media as recited in claim 46, wherein the plurality of instructions further cause the one or more processors to perform acts including:
receiving content from a content source; and
generating the piece of highly compressed content based on the received content.
51. One or more computer-readable media as recited in claim 46, wherein the checking comprises:
comparing a first set of feature values associated with the piece of highly compressed content with a second set of feature values associated with the portion of media content; and
checking whether at least a threshold number of the first set of feature values is within threshold distance of the second set of feature values.
52. One or more computer-readable media as recited in claim 51, wherein the first set of feature values and the second set of feature values each comprises a set of audio energy features.
53. One or more computer-readable media having stored thereon a plurality of instructions that, when executed by one or more processors of a computer, causes the one or more processors to perform acts including:
receiving a portion of media content; and
generating a highly compressed content piece based on the portion of media content, wherein the piece of highly compressed content cannot be played back to a user in an intelligible form but can be compared to the portion of media content for equality with a high degree of accuracy.
54. One or more computer-readable media as recited in claim 53, wherein the generating comprises extracting a plurality of features from the media content and selecting groups of the extracted features as the highly compressed piece of content.
55. One or more computer-readable media as recited in claim 54, wherein the plurality of features comprise a plurality of energy features.
56. One or more computer-readable media as recited in claim 53, wherein the plurality of instructions further cause the one or more processors to perform acts including communicating the highly compressed content piece to a content player.
57. One or more computer-readable media as recited in claim 53, wherein the plurality of instructions further cause the one or more processors to perform acts including saving the highly compressed content piece in a local storage device of a content player for subsequent comparisons to media content to be played back at the content player.
US09/843,102 2001-04-24 2001-04-24 Method and system for detecting pirated content Expired - Fee Related US7424747B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/843,102 US7424747B2 (en) 2001-04-24 2001-04-24 Method and system for detecting pirated content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/843,102 US7424747B2 (en) 2001-04-24 2001-04-24 Method and system for detecting pirated content

Publications (2)

Publication Number Publication Date
US20020156743A1 true US20020156743A1 (en) 2002-10-24
US7424747B2 US7424747B2 (en) 2008-09-09

Family

ID=25289079

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/843,102 Expired - Fee Related US7424747B2 (en) 2001-04-24 2001-04-24 Method and system for detecting pirated content

Country Status (1)

Country Link
US (1) US7424747B2 (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188840A1 (en) * 2001-06-07 2002-12-12 Isao Echizen Method and system for contents control
US20030016842A1 (en) * 2001-07-23 2003-01-23 Patton Charles M. Digital content with information of latent value to purchaser and method for making the same
US20030072491A1 (en) * 2001-10-17 2003-04-17 Sudheer Sirivara Identifying image content
US20030110126A1 (en) * 2001-12-10 2003-06-12 Dunkeld Bryan C. System & method for unique digital asset identification and transaction management
US20050163483A1 (en) * 2004-01-22 2005-07-28 Widevine Technologies, Inc. Piracy prevention system
US20060277609A1 (en) * 2005-06-07 2006-12-07 Marc Brandon Method and apparatus for tracking pirated media
US20070157320A1 (en) * 2005-12-29 2007-07-05 Navio Systems Inc. Software, systems, and methods for processing digital bearer instruments
US20080215896A1 (en) * 2003-02-25 2008-09-04 Steve Bourne Issuing a Publisher Use License Off-Line in a Digital Rights Management (DRM) System
US20080243693A1 (en) * 2006-11-15 2008-10-02 Navio Systems, Inc. Title-acceptance and processing architecture
US20080256627A1 (en) * 2007-04-13 2008-10-16 Heikki Kokkinen Copyrights with post-payments for p2p file sharing
WO2009020850A1 (en) * 2007-08-03 2009-02-12 Infoflows Corporation Digital content management system and method
US20090133079A1 (en) * 2007-11-15 2009-05-21 At&T Knowledge Ventures, L.P. Detecting Distribution of Multimedia Content
US20090328125A1 (en) * 2008-06-30 2009-12-31 Gits Peter M Video fingerprint systems and methods
US20090327334A1 (en) * 2008-06-30 2009-12-31 Rodriguez Arturo A Generating Measures of Video Sequences to Detect Unauthorized Use
US20090328237A1 (en) * 2008-06-30 2009-12-31 Rodriguez Arturo A Matching of Unknown Video Content To Protected Video Content
US7778929B2 (en) 2006-12-13 2010-08-17 Ricall Inc. Online music and other copyrighted work search and licensing system
US20130041826A1 (en) * 2007-04-13 2013-02-14 Vringo, Inc. Content Purchaser Distribution Payment System
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US8781969B2 (en) 2005-05-20 2014-07-15 Microsoft Corporation Extensible media rights
US9509704B2 (en) 2011-08-02 2016-11-29 Oncircle, Inc. Rights-based system
US9621372B2 (en) 2006-04-29 2017-04-11 Oncircle, Inc. Title-enabled networking
US20170289156A1 (en) * 2014-09-25 2017-10-05 Amazon Technologies, Inc. Broadcast-based trust establishment
US10198719B2 (en) 2005-12-29 2019-02-05 Api Market, Inc. Software, systems, and methods for processing digital bearer instruments
US10303925B2 (en) * 2016-06-24 2019-05-28 Google Llc Optimization processes for compressing media content
US20210126945A1 (en) * 2018-03-27 2021-04-29 Niippon Telegraph And Telephone Corporation Illegal content search device, illegal content search method, and program
US11138207B2 (en) 2015-09-22 2021-10-05 Google Llc Integrated dynamic interface for expression-based retrieval of expressive media content
US20220327582A1 (en) * 2021-04-09 2022-10-13 i2i LLC Method for Improving Service Outcomes Using Artificial Intelligence Techniques

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6834308B1 (en) * 2000-02-17 2004-12-21 Audible Magic Corporation Method and apparatus for identifying media content presented on a media playing device
WO2002082271A1 (en) 2001-04-05 2002-10-17 Audible Magic Corporation Copyright detection and protection system and method
US8972481B2 (en) 2001-07-20 2015-03-03 Audible Magic, Inc. Playlist generation method and apparatus
JP4343551B2 (en) * 2003-02-25 2009-10-14 パイオニア株式会社 Information provision system and information provision program
CN100571121C (en) * 2004-08-27 2009-12-16 国际商业机器公司 Tracing pirate in the wireless digital copyright management system and recognition methods
US7912894B2 (en) * 2007-05-15 2011-03-22 Adams Phillip M Computerized, copy-detection and discrimination apparatus and method
US7971261B2 (en) * 2007-06-12 2011-06-28 Microsoft Corporation Domain management for digital media
US8006314B2 (en) 2007-07-27 2011-08-23 Audible Magic Corporation System for identifying content of digital data
US8667279B2 (en) 2008-07-01 2014-03-04 Sling Media, Inc. Systems and methods for securely place shifting media content
US8381310B2 (en) * 2009-08-13 2013-02-19 Sling Media Pvt. Ltd. Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content
US20100259610A1 (en) * 2009-04-08 2010-10-14 Celsia, Llc Two-Dimensional Display Synced with Real World Object Movement
US9160974B2 (en) 2009-08-26 2015-10-13 Sling Media, Inc. Systems and methods for transcoding and place shifting media content
US9043435B2 (en) 2011-10-24 2015-05-26 International Business Machines Corporation Distributing licensed content across multiple devices
US9081778B2 (en) 2012-09-25 2015-07-14 Audible Magic Corporation Using digital fingerprints to associate data with a work
WO2015021210A1 (en) * 2013-08-06 2015-02-12 Medknex Software, Llc System and methods for protecting and using digital data

Citations (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4136395A (en) * 1976-12-28 1979-01-23 International Business Machines Corporation System for automatically proofreading a document
US5142662A (en) * 1986-03-03 1992-08-25 Bell & Howell Company Electronic publishing system
US5390297A (en) * 1987-11-10 1995-02-14 Auto-Trol Technology Corporation System for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US5619571A (en) * 1995-06-01 1997-04-08 Sandstrom; Brent B. Method for securely storing electronic records
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5757915A (en) * 1995-08-25 1998-05-26 Intel Corporation Parameterized hash functions for access control
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5781629A (en) * 1994-10-28 1998-07-14 Surety Technologies, Inc. Digital document authentication system
US5818933A (en) * 1995-07-07 1998-10-06 Mitsubishi Denki Kabushiki Kaisha Copyright control system
US5832208A (en) * 1996-09-05 1998-11-03 Cheyenne Software International Sales Corp. Anti-virus agent for use with databases and mail servers
US5956034A (en) * 1996-08-13 1999-09-21 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials
US5986690A (en) * 1992-12-09 1999-11-16 Discovery Communications, Inc. Electronic book selection and delivery system
US5987525A (en) * 1997-04-15 1999-11-16 Cddb, Inc. Network delivery of interactive entertainment synchronized to playback of audio recordings
US5995623A (en) * 1996-01-30 1999-11-30 Fuji Xerox Co., Ltd. Information processing apparatus with a software protecting function
US6012890A (en) * 1996-10-04 2000-01-11 Instabook Corporation Electronic bookstore vending machine
US6052717A (en) * 1996-10-23 2000-04-18 Family Systems, Ltd. Interactive web book system
US6119108A (en) * 1998-10-01 2000-09-12 Aires Systems Corporation Secure electronic publishing system
US6161183A (en) * 1996-10-21 2000-12-12 Fuji Xerox Co., Ltd. Data verifying method apparatus for creating data to be verified and data verifying apparatus
US6289450B1 (en) * 1999-05-28 2001-09-11 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
US6301660B1 (en) * 1997-07-31 2001-10-09 Siemens Aktiengesellschaft Computer system for protecting a file and a method for protecting a file
US6314518B1 (en) * 1997-08-26 2001-11-06 U.S. Philips Corporation System for transferring content information and supplemental information relating thereto
US20010041989A1 (en) * 2000-05-10 2001-11-15 Vilcauskas Andrew J. System for detecting and preventing distribution of intellectual property protected media
US20010051996A1 (en) * 2000-02-18 2001-12-13 Cooper Robin Ross Network-based content distribution system
US6347375B1 (en) * 1998-07-08 2002-02-12 Ontrack Data International, Inc Apparatus and method for remote virus diagnosis and repair
US20020023020A1 (en) * 1999-09-21 2002-02-21 Kenyon Stephen C. Audio identification system and method
US6356287B1 (en) * 1998-03-20 2002-03-12 Nuvomedia, Inc. Citation selection and routing feature for hand-held content display device
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6388957B2 (en) * 1995-07-26 2002-05-14 Sony Corporation Recorded media player with database
US20020129140A1 (en) * 2001-03-12 2002-09-12 Ariel Peled System and method for monitoring unauthorized transport of digital content
US20020152262A1 (en) * 2001-04-17 2002-10-17 Jed Arkin Method and system for preventing the infringement of intellectual property rights
US6470333B1 (en) * 1998-07-24 2002-10-22 Jarg Corporation Knowledge extraction system and method
US6496802B1 (en) * 2000-01-07 2002-12-17 Mp3.Com, Inc. System and method for providing access to electronic works
US6577735B1 (en) * 1999-02-12 2003-06-10 Hewlett-Packard Development Company, L.P. System and method for backing-up data stored on a portable audio player
US6594686B1 (en) * 2000-03-02 2003-07-15 Network Associates Technology, Inc. Obtaining user responses in a virtual execution environment
US6735699B1 (en) * 1998-09-24 2004-05-11 Ryuichi Sasaki Method and system for monitoring use of digital works
US6766305B1 (en) * 1999-03-12 2004-07-20 Curl Corporation Licensing system and method for freely distributed information
US6868405B1 (en) * 1999-11-29 2005-03-15 Microsoft Corporation Copy detection for digitally-formatted works
US6868494B1 (en) * 1999-03-09 2005-03-15 Sony Corporation Reproducing apparatus and information distribution system
US6873975B1 (en) * 1999-04-06 2005-03-29 Fujitsu Limited Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method
US6915425B2 (en) * 2000-12-13 2005-07-05 Aladdin Knowledge Systems, Ltd. System for permitting off-line playback of digital content, and for managing content rights
US7266202B1 (en) * 1999-02-17 2007-09-04 Sony Corporation Information processing device and method, and program storage medium
US7349381B1 (en) * 2000-04-28 2008-03-25 Rockwell Collins Synchronization technique for spread spectrum frequency hopped data links and radios using the same

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000286836A (en) 1999-03-30 2000-10-13 Fujitsu Ltd Certification device and recording medium

Patent Citations (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4136395A (en) * 1976-12-28 1979-01-23 International Business Machines Corporation System for automatically proofreading a document
US5142662A (en) * 1986-03-03 1992-08-25 Bell & Howell Company Electronic publishing system
US5390297A (en) * 1987-11-10 1995-02-14 Auto-Trol Technology Corporation System for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US5986690A (en) * 1992-12-09 1999-11-16 Discovery Communications, Inc. Electronic book selection and delivery system
US5781629A (en) * 1994-10-28 1998-07-14 Surety Technologies, Inc. Digital document authentication system
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5619571A (en) * 1995-06-01 1997-04-08 Sandstrom; Brent B. Method for securely storing electronic records
US5818933A (en) * 1995-07-07 1998-10-06 Mitsubishi Denki Kabushiki Kaisha Copyright control system
US6388957B2 (en) * 1995-07-26 2002-05-14 Sony Corporation Recorded media player with database
US5757915A (en) * 1995-08-25 1998-05-26 Intel Corporation Parameterized hash functions for access control
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5995623A (en) * 1996-01-30 1999-11-30 Fuji Xerox Co., Ltd. Information processing apparatus with a software protecting function
US5956034A (en) * 1996-08-13 1999-09-21 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials
US5832208A (en) * 1996-09-05 1998-11-03 Cheyenne Software International Sales Corp. Anti-virus agent for use with databases and mail servers
US6012890A (en) * 1996-10-04 2000-01-11 Instabook Corporation Electronic bookstore vending machine
US6161183A (en) * 1996-10-21 2000-12-12 Fuji Xerox Co., Ltd. Data verifying method apparatus for creating data to be verified and data verifying apparatus
US6052717A (en) * 1996-10-23 2000-04-18 Family Systems, Ltd. Interactive web book system
US5987525A (en) * 1997-04-15 1999-11-16 Cddb, Inc. Network delivery of interactive entertainment synchronized to playback of audio recordings
US6301660B1 (en) * 1997-07-31 2001-10-09 Siemens Aktiengesellschaft Computer system for protecting a file and a method for protecting a file
US6314518B1 (en) * 1997-08-26 2001-11-06 U.S. Philips Corporation System for transferring content information and supplemental information relating thereto
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6356287B1 (en) * 1998-03-20 2002-03-12 Nuvomedia, Inc. Citation selection and routing feature for hand-held content display device
US6347375B1 (en) * 1998-07-08 2002-02-12 Ontrack Data International, Inc Apparatus and method for remote virus diagnosis and repair
US6470333B1 (en) * 1998-07-24 2002-10-22 Jarg Corporation Knowledge extraction system and method
US6735699B1 (en) * 1998-09-24 2004-05-11 Ryuichi Sasaki Method and system for monitoring use of digital works
US6119108A (en) * 1998-10-01 2000-09-12 Aires Systems Corporation Secure electronic publishing system
US6577735B1 (en) * 1999-02-12 2003-06-10 Hewlett-Packard Development Company, L.P. System and method for backing-up data stored on a portable audio player
US7266202B1 (en) * 1999-02-17 2007-09-04 Sony Corporation Information processing device and method, and program storage medium
US6868494B1 (en) * 1999-03-09 2005-03-15 Sony Corporation Reproducing apparatus and information distribution system
US6766305B1 (en) * 1999-03-12 2004-07-20 Curl Corporation Licensing system and method for freely distributed information
US6873975B1 (en) * 1999-04-06 2005-03-29 Fujitsu Limited Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method
US6289450B1 (en) * 1999-05-28 2001-09-11 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
US20020023020A1 (en) * 1999-09-21 2002-02-21 Kenyon Stephen C. Audio identification system and method
US6868405B1 (en) * 1999-11-29 2005-03-15 Microsoft Corporation Copy detection for digitally-formatted works
US6496802B1 (en) * 2000-01-07 2002-12-17 Mp3.Com, Inc. System and method for providing access to electronic works
US20010051996A1 (en) * 2000-02-18 2001-12-13 Cooper Robin Ross Network-based content distribution system
US6594686B1 (en) * 2000-03-02 2003-07-15 Network Associates Technology, Inc. Obtaining user responses in a virtual execution environment
US7349381B1 (en) * 2000-04-28 2008-03-25 Rockwell Collins Synchronization technique for spread spectrum frequency hopped data links and radios using the same
US20010041989A1 (en) * 2000-05-10 2001-11-15 Vilcauskas Andrew J. System for detecting and preventing distribution of intellectual property protected media
US6915425B2 (en) * 2000-12-13 2005-07-05 Aladdin Knowledge Systems, Ltd. System for permitting off-line playback of digital content, and for managing content rights
US20020129140A1 (en) * 2001-03-12 2002-09-12 Ariel Peled System and method for monitoring unauthorized transport of digital content
US20020152262A1 (en) * 2001-04-17 2002-10-17 Jed Arkin Method and system for preventing the infringement of intellectual property rights

Cited By (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7478432B2 (en) * 2001-06-07 2009-01-13 Hitachi, Ltd. Method and system for contents control
US20020188840A1 (en) * 2001-06-07 2002-12-12 Isao Echizen Method and system for contents control
US20030016842A1 (en) * 2001-07-23 2003-01-23 Patton Charles M. Digital content with information of latent value to purchaser and method for making the same
US20030072491A1 (en) * 2001-10-17 2003-04-17 Sudheer Sirivara Identifying image content
US8259989B2 (en) 2001-10-17 2012-09-04 Intel Corporation Identifying image content
US6961467B2 (en) * 2001-10-17 2005-11-01 Intel Corporation Identifying image content
US20060050964A1 (en) * 2001-10-17 2006-03-09 Sudheer Sirivara Identifying image content
US8626838B2 (en) 2001-12-10 2014-01-07 Content Technologies, Llc Digital media asset identification system and method
US20080215633A1 (en) * 2001-12-10 2008-09-04 Dunkeld Bryan C Digital Media Asset Conversion System and Method
US20080215632A1 (en) * 2001-12-10 2008-09-04 Dunkeld Bryan C Digital Media Asset Identification System and Method
US8001052B2 (en) * 2001-12-10 2011-08-16 Dunkeld Bryan C System and method for unique digital asset identification and transaction management
US8583556B2 (en) 2001-12-10 2013-11-12 Content Technologies, Llc Method of providing a digital asset for distribution
US8200581B2 (en) 2001-12-10 2012-06-12 Content Technologies, Llc Digital media asset conversion system and method
US20030110126A1 (en) * 2001-12-10 2003-06-12 Dunkeld Bryan C. System & method for unique digital asset identification and transaction management
US8606856B2 (en) 2001-12-10 2013-12-10 Content Technologies, Llc Digital media asset identification system and method
US8706636B2 (en) 2001-12-10 2014-04-22 Content Technologies Llc System and method for unique digital asset identification and transaction management
US8719171B2 (en) 2003-02-25 2014-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US20080215896A1 (en) * 2003-02-25 2008-09-04 Steve Bourne Issuing a Publisher Use License Off-Line in a Digital Rights Management (DRM) System
US8700535B2 (en) * 2003-02-25 2014-04-15 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US20050163483A1 (en) * 2004-01-22 2005-07-28 Widevine Technologies, Inc. Piracy prevention system
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US8781969B2 (en) 2005-05-20 2014-07-15 Microsoft Corporation Extensible media rights
US20060277609A1 (en) * 2005-06-07 2006-12-07 Marc Brandon Method and apparatus for tracking pirated media
US20070157320A1 (en) * 2005-12-29 2007-07-05 Navio Systems Inc. Software, systems, and methods for processing digital bearer instruments
US9177338B2 (en) * 2005-12-29 2015-11-03 Oncircle, Inc. Software, systems, and methods for processing digital bearer instruments
US10198719B2 (en) 2005-12-29 2019-02-05 Api Market, Inc. Software, systems, and methods for processing digital bearer instruments
US9621372B2 (en) 2006-04-29 2017-04-11 Oncircle, Inc. Title-enabled networking
US10467606B2 (en) 2006-04-29 2019-11-05 Api Market, Inc. Enhanced title processing arrangement
US10999094B2 (en) 2006-04-29 2021-05-04 Api Market, Inc. Title-enabled networking
US10192234B2 (en) 2006-11-15 2019-01-29 Api Market, Inc. Title materials embedded within media formats and related applications
US10380621B2 (en) * 2006-11-15 2019-08-13 Api Market, Inc. Title-acceptance and processing architecture
US11494801B2 (en) 2006-11-15 2022-11-08 Api Market, Inc. Methods and medium for title materials embedded within media formats and related applications
US20080243693A1 (en) * 2006-11-15 2008-10-02 Navio Systems, Inc. Title-acceptance and processing architecture
US7778929B2 (en) 2006-12-13 2010-08-17 Ricall Inc. Online music and other copyrighted work search and licensing system
US20130067602A1 (en) * 2007-04-13 2013-03-14 Vringo Infrastructure, Inc. Copyrights with Post-Payments for P2P File Sharing
US20130041826A1 (en) * 2007-04-13 2013-02-14 Vringo, Inc. Content Purchaser Distribution Payment System
US20080256627A1 (en) * 2007-04-13 2008-10-16 Heikki Kokkinen Copyrights with post-payments for p2p file sharing
WO2008125992A1 (en) * 2007-04-13 2008-10-23 Nokia Corporation Copyrights with post-payments for p2p file sharing
WO2009020850A1 (en) * 2007-08-03 2009-02-12 Infoflows Corporation Digital content management system and method
US8601503B2 (en) 2007-11-15 2013-12-03 At&T Intellectual Property I, L.P. Detecting distribution of multimedia content
US8359609B2 (en) 2007-11-15 2013-01-22 At&T Intellectual Property I, L.P. Detecting distribution of multimedia content
US20110197240A1 (en) * 2007-11-15 2011-08-11 At&T Intellectual Property I, L.P. Detecting distribution of multimedia content
US7945924B2 (en) * 2007-11-15 2011-05-17 At&T Intellectual Property I, L.P. Detecting distribution of multimedia content
US20090133079A1 (en) * 2007-11-15 2009-05-21 At&T Knowledge Ventures, L.P. Detecting Distribution of Multimedia Content
US20090328125A1 (en) * 2008-06-30 2009-12-31 Gits Peter M Video fingerprint systems and methods
US20090328237A1 (en) * 2008-06-30 2009-12-31 Rodriguez Arturo A Matching of Unknown Video Content To Protected Video Content
US20090327334A1 (en) * 2008-06-30 2009-12-31 Rodriguez Arturo A Generating Measures of Video Sequences to Detect Unauthorized Use
US8347408B2 (en) * 2008-06-30 2013-01-01 Cisco Technology, Inc. Matching of unknown video content to protected video content
US8259177B2 (en) * 2008-06-30 2012-09-04 Cisco Technology, Inc. Video fingerprint systems and methods
US10706168B2 (en) 2011-08-02 2020-07-07 Api Market, Inc. Rights-based system
US9509704B2 (en) 2011-08-02 2016-11-29 Oncircle, Inc. Rights-based system
US10073984B2 (en) 2011-08-02 2018-09-11 Api Market, Inc. Rights based system
US11599657B2 (en) 2011-08-02 2023-03-07 Api Market, Inc. Rights-based system
US10587617B2 (en) * 2014-09-25 2020-03-10 Amazon Technologies, Inc. Broadcast-based trust establishment
US20170289156A1 (en) * 2014-09-25 2017-10-05 Amazon Technologies, Inc. Broadcast-based trust establishment
US11138207B2 (en) 2015-09-22 2021-10-05 Google Llc Integrated dynamic interface for expression-based retrieval of expressive media content
US10671836B2 (en) * 2016-06-24 2020-06-02 Google Llc Optimization processes for compressing media content
US10303925B2 (en) * 2016-06-24 2019-05-28 Google Llc Optimization processes for compressing media content
US20210126945A1 (en) * 2018-03-27 2021-04-29 Niippon Telegraph And Telephone Corporation Illegal content search device, illegal content search method, and program
US12069090B2 (en) * 2018-03-27 2024-08-20 Nippon Telegraph And Telephone Corporation Illegal content search device, illegal content search method, and program
US20220327582A1 (en) * 2021-04-09 2022-10-13 i2i LLC Method for Improving Service Outcomes Using Artificial Intelligence Techniques
US11995696B2 (en) * 2021-04-09 2024-05-28 i2i LLC Method for improving service outcomes using artificial intelligence techniques

Also Published As

Publication number Publication date
US7424747B2 (en) 2008-09-09

Similar Documents

Publication Publication Date Title
US7424747B2 (en) Method and system for detecting pirated content
US20190114396A1 (en) Methods and apparatus for sharing, transferring and removing previously owned digital media
US8850214B2 (en) Methods and systems for encoding and protecting data using digital signature and watermarking techniques
US5822432A (en) Method for human-assisted random key generation and application for digital watermark system
US7657752B2 (en) Digital signal watermaker
US7460683B2 (en) Asymmetric spread-spectrum watermarking systems and methods of use
US6802003B1 (en) Method and apparatus for authenticating content
US20020112163A1 (en) Ensuring legitimacy of digital media
US20030233547A1 (en) Systems and methods for preventing and detecting unauthorized copying of software
JP2002055884A (en) Contents copy management system, its method, information processor, its method, server and storage medium
JP2005227756A (en) Desynchronized fingerprinting method and system, for digital multimedia data
KR20040101299A (en) Feature-based audio content identification
US20090007279A1 (en) Rights enforcement of unencrypted content

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DETREVILLE, JOHN D.;REEL/FRAME:011768/0847

Effective date: 20010420

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034541/0001

Effective date: 20141014

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20200909